Venafi / blueprint-securesoftwarepipelineLinks
For engineers and security teams driving fast and secure software supply chains
☆83Updated 2 years ago
Alternatives and similar repositories for blueprint-securesoftwarepipeline
Users that are interested in blueprint-securesoftwarepipeline are comparing it to the libraries listed below
Sorting:
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆173Updated 7 months ago
- OWASP Foundation Web Respository☆55Updated 2 years ago
- ☆16Updated last year
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆150Updated this week
- Documenting your Threat Models with HCL☆432Updated last month
- ☆113Updated last week
- Count distinct contributor of Snyk watched repos across several SCM☆32Updated last year
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆192Updated last year
- Compares and analyzes GCP IAM roles.☆77Updated 4 months ago
- Open Source Software Secure Supply Chain Framework☆236Updated 2 years ago
- GitHub action to scan container images with Palo Alto Networks' Prisma Cloud☆58Updated 3 months ago
- The S2C2F Project is a group working within the OpenSSF's Supply Chain Integrity Working Group formed to further develop and continuously…☆210Updated last month
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- ☆117Updated last month
- ☆285Updated 2 years ago
- Evaluate source control (GitHub) security posture☆250Updated 2 years ago
- A reading list for software supply-chain security.☆363Updated 2 years ago
- Open source compliance tool for development platforms.☆286Updated last year
- Rego policies for enterprise-scale Compliance-as-Code with OPA Conftest.☆58Updated last year
- A tool to create, transform and attest VEX metadata☆147Updated 2 weeks ago
- Generate a score for your sbom to understand if it will actually be useful.☆230Updated 11 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆102Updated last year
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- Scan GitHub Actions Workflow logs for IOCs☆15Updated this week
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆78Updated 6 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆285Updated 10 months ago
- Cloud Security Posture security policies☆31Updated 10 months ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆189Updated 10 months ago
- A deliberately vulnerable Kubernetes cluster☆127Updated last year